reversePromedium
Randser
spbctf
Task: a 32-bit ELF asks for a serial matching a generated username and UID, then prints a flag. Solution: reverse the PRNG-based login/UID generation, derive the serial formula from the XOR-plus-7 check, and recover the real flag by XOR-reducing 100 hardcoded 16-byte strings.
$ ls tags/ techniques/
static_analysisprng_stream_reconstructionserial_formula_derivationxor_reduction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]spbctf_2_x86— spbctf
- [reverse][Pro]s5.out— spbctf
- [reverse][free]FlagCasino— hackthebox
- [reverse][Pro]Narkoman— sbpctf
- [reverse][Pro]s4.out— spbctf